Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (407)
  • Open Access

    ARTICLE

    Exploration on the Load Balancing Technique for Platform of Internet of Things

    Donglei Lu1, Dongjie Zhu2,*, Yundong Sun3, Haiwen Du3, Xiaofang Li4, Rongning Qu4, Yansong Wang3, Ning Cao1, Helen Min Zhou5

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 339-350, 2021, DOI:10.32604/csse.2021.016683

    Abstract In recent years, the Internet of Things technology has developed rapidly, and smart Internet of Things devices have also been widely popularized. A large amount of data is generated every moment. Now we are in the era of big data in the Internet of Things. The rapid growth of massive data has brought great challenges to storage technology, which cannot be well coped with by traditional storage technology. The demand for massive data storage has given birth to cloud storage technology. Load balancing technology plays an important role in improving the performance and resource utilization of cloud storage systems. Therefore,… More >

  • Open Access

    ARTICLE

    Investigating and Modelling of Task Offloading Latency in Edge-Cloud Environment

    Jaber Almutairi1, Mohammad Aldossary2,*,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4143-4160, 2021, DOI:10.32604/cmc.2021.018145

    Abstract Recently, the number of Internet of Things (IoT) devices connected to the Internet has increased dramatically as well as the data produced by these devices. This would require offloading IoT tasks to release heavy computation and storage to the resource-rich nodes such as Edge Computing and Cloud Computing. However, different service architecture and offloading strategies have a different impact on the service time performance of IoT applications. Therefore, this paper presents an Edge-Cloud system architecture that supports scheduling offloading tasks of IoT applications in order to minimize the enormous amount of transmitting data in the network. Also, it introduces the… More >

  • Open Access

    ARTICLE

    Intelligent Framework for Secure Transportation Systems Using Software-Defined-Internet of Vehicles

    Mohana Priya Pitchai1, Manikandan Ramachandran1,*, Fadi Al-Turjman2, Leonardo Mostarda3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3947-3966, 2021, DOI:10.32604/cmc.2021.015568

    Abstract The Internet of Things plays a predominant role in automating all real-time applications. One such application is the Internet of Vehicles which monitors the roadside traffic for automating traffic rules. As vehicles are connected to the internet through wireless communication technologies, the Internet of Vehicles network infrastructure is susceptible to flooding attacks. Reconfiguring the network infrastructure is difficult as network customization is not possible. As Software Defined Network provide a flexible programming environment for network customization, detecting flooding attacks on the Internet of Vehicles is integrated on top of it. The basic methodology used is crypto-fuzzy rules, in which cryptographic… More >

  • Open Access

    ARTICLE

    Secure Multifactor Remote Access User Authentication Framework for IoT Networks

    Mohammed Mujib Alshahrani*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3235-3254, 2021, DOI:10.32604/cmc.2021.015310

    Abstract The term IoT refers to the interconnection and exchange of data among devices/sensors. IoT devices are often small, low cost, and have limited resources. The IoT issues and challenges are growing increasingly. Security and privacy issues are among the most important concerns in IoT applications, such as smart buildings. Remote cybersecurity attacks are the attacks which do not require physical access to the IoT networks, where the attacker can remotely access and communicate with the IoT devices through a wireless communication channel. Thus, remote cybersecurity attacks are a significant threat. Emerging applications in smart environments such as smart buildings require… More >

  • Open Access

    ARTICLE

    Verifiable Identity-Based Encryption with Keyword Search for IoT from Lattice

    Lin Mei1, Chungen Xu1,*, Lei Xu1, Xiaoling Yu2, Cong Zuo3

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2299-2314, 2021, DOI:10.32604/cmc.2021.017216

    Abstract Internet of Things (IoT), which provides the solution of connecting things and devices, has increasingly developed as vital tools to realize intelligent life. Generally, source-limited IoT sensors outsource their data to the cloud, which arises the concerns that the transmission of IoT data is happening without appropriate consideration of the profound security challenges involved. Though encryption technology can guarantee the confidentiality of private data, it hinders the usability of data. Searchable encryption (SE) has been proposed to achieve secure data sharing and searching. However, most of existing SE schemes are designed under conventional hardness assumptions and may be vulnerable to… More >

  • Open Access

    ARTICLE

    An Optimal Classification Model for Rice Plant Disease Detection

    R. Sowmyalakshmi1, T. Jayasankar1,*, V. Ayyem Pillai2, Kamalraj Subramaniyan3, Irina V. Pustokhina4, Denis A. Pustokhin5, K. Shankar6

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1751-1767, 2021, DOI:10.32604/cmc.2021.016825

    Abstract Internet of Things (IoT) paves a new direction in the domain of smart farming and precision agriculture. Smart farming is an upgraded version of agriculture which is aimed at improving the cultivation practices and yield to a certain extent. In smart farming, IoT devices are linked among one another with new technologies to improve the agricultural practices. Smart farming makes use of IoT devices and contributes in effective decision making. Rice is the major food source in most of the countries. So, it becomes inevitable to detect rice plant diseases during early stages with the help of automated tools and… More >

  • Open Access

    ARTICLE

    Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks

    Hafsa Shahid1, Humaira Ashraf1, Hafsa Javed1, Mamoona Humayun2, Nz Jhanjhi3,*, Mohammed A. AlZain4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1967-1981, 2021, DOI:10.32604/cmc.2021.015259

    Abstract An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation… More >

  • Open Access

    ARTICLE

    Cogent and Energy Efficient Authentication Protocol for WSN in IoT

    Tariq Mahmood Butt1, Rabia Riaz1, Chinmay Chakraborty2, Sanam Shahla Rizvi3, Anand Paul4,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1877-1898, 2021, DOI:10.32604/cmc.2021.014966

    Abstract Given the accelerating development of Internet of things (IoT), a secure and robust authentication mechanism is urgently required as a critical architectural component. The IoT has improved the quality of everyday life for numerous people in many ways. Owing to the predominantly wireless nature of the IoT, connected devices are more vulnerable to security threats compared to wired networks. User authentication is thus of utmost importance in terms of security on the IoT. Several authentication protocols have been proposed in recent years, but most prior schemes do not provide sufficient security for these wireless networks. To overcome the limitations of… More >

  • Open Access

    ARTICLE

    Remote Health Monitoring Using IoT-Based Smart Wireless Body Area Network

    Farhan Aadil1, Bilal Mehmood1, Najam Ul Hasan2, Sangsoon Lim3,*, Sadia Ejaz1, Noor Zaman4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2499-2513, 2021, DOI:10.32604/cmc.2021.014647

    Abstract A wireless body area network (WBAN) consists of tiny health-monitoring sensors implanted in or placed on the human body. These sensors are used to collect and communicate human medical and physiological data and represent a subset of the Internet of Things (IoT) systems. WBANs are connected to medical servers that monitor patients’ health. This type of network can protect critical patients’ lives due to the ability to monitor patients’ health continuously and remotely. The inter-WBAN communication provides a dynamic environment for patients allowing them to move freely. However, during patient movement, the WBAN patient nodes may become out of range… More >

  • Open Access

    ARTICLE

    Design, Implementation and Verification of Topology Network Architecture of Smart Home Tree

    Youbang Guan1,2, Bong Jun Choi3,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2399-2411, 2021, DOI:10.32604/cmc.2021.012365

    Abstract Smart home technology provides consumers with network connectivity, automation or enhanced services for home devices. With the Internet of Things era, a vast data flow makes business platforms have to own the same computing power to match their business services. It achieves computing power through implementing big data algorithms deployed in the cloud data center. However, because of the far long geographical distance between the client and the data center or the massive data capacity gap, potentially high latency and high packet loss will reduce the usability of smart home systems if service providers deploy all services in the cloud… More >

Displaying 331-340 on page 34 of 407. Per Page